Sciweavers

166 search results - page 6 / 34
» pervasive 2009
Sort
View
PERCOM
2009
ACM
14 years 5 months ago
Concurrent Event Detection for Asynchronous Consistency Checking of Pervasive Context
—Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environme...
Yu Huang 0002, Xiaoxing Ma, Jiannong Cao, XianPing...
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 8 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
PERCOM
2009
ACM
14 years 11 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
COMPSAC
2009
IEEE
14 years 5 months ago
A Perspective on Middleware-Oriented Context-Aware Pervasive Systems
The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this...
Zakwan Jaroucheh, Xiaodong Liu, Sally Smith
ICSE
2009
IEEE-ACM
13 years 8 months ago
Self-healing for Pervasive Computing Systems
The development of small wireless sensors and smart-phones, which include various sound, video, motion and location sensors have facilitated new pervasive applications. These perva...
Themistoklis Bourdenas, Morris Sloman, Emil C. Lup...